Confidentiality & Privacy Flashcards

1
Q

What kind of party losses are compensatory damages?

A

3rd party losses because they provide restitution for the harm caused to consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is symmetric key encryption?

A
  • It is a type of encryption that uses the same private key for encryption and decryption.
  • This encryption type is good for protecting data at rest in a database.
  • It uses Advanced Encryption Standard (AES) to generate keys of 128, 192, or 256 bits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is asymmetric encryption?

A
  • It is encryption in which a public key is used for encryption and private key is used for decryption.
  • Asymmetric encryption uses the RSA algorithm to generate keys.
    This encryption uses key length of 2048, 3072, or 4096 bits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the RSA algorithm?

A
  • It is an algorithm in which RSA is used in blockchain technology, for digital signatures, and situations where identification is necessary.
  • RSA requires much larger keys than AES, usually 2048, 3072, or 4096 bits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does symmetric encryption secure?

A

It secures the actual data being transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does asymmetric encryption do?

A

It it used to establish a secure communication channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a suitable choice for securing email communication or messaging applications?

A

Asymmetric encryption because there are separate public and private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Merchants that process credit cards must comply with what?

A

Payment Card Industry Data Security Standard (PCI DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is tokenization?

A
  • It is a data obfuscation (process of concealing information) technique where it substitutes a customer’s credit card number with a random alphanumeric string (the token).
  • The merchant transfers the token to the payment processor who then tokenizes (a process of HIDING your customer’s card information with a randomly generated series of letters and numbers or an alphanumeric string of characters called a “token” that can only be decrypted by the bank when processing a transaction) the token to confirm payment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does encryption use that tokenization doesn’t use?

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is data masking?

A
  • AKA DATA REPLACEMENT
  • It is a technique in which the masking PERMANENTLY substitutes data with fake data that appears equivalent to the original.
  • Ex: Denny Miyasato becomes Joel Kasten
    When you hear MASK, think of Halloween masks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data replacement?

A

AKA HASHING
It involves replacing real data with meaningless symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 phases of the data life cycle?

A
  • Creation/collection
  • Use
  • Storage
  • Disposal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Management should design and implement controls that ensure that data collection forms ask for what?

A

The MINIMUM INFORMATION NECESSARY for legitimate and lawful purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are examples of risk assessment procedures?

A
  • Re-performance (walkthrough)
  • Inquiry
  • Inspection
  • Observation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a walkthrough?

A
  • It is a risk assessment procedure where a combination of risk assessment controls (inquiry, inspection, observation) are used to compare a process to the documented policy
17
Q

To provide the same level of assurance as an inked signature in a paper transaction, what would a digitally signed transaction use?

A

Hashing and asymmetric encryption for authentication

18
Q

What is hashing?

A
  • AKA Data Replacement.
  • Hashing uses an algorithm to change data into a fixed string (ex: ###).
  • After hashing the signature, the signer encrypts it using a private key.
  • The receiver is given a public key to decrypt the hashed signature.
19
Q

Privacy regulations (HIPAA) require the data subject’s _____ before the data holder can disclose information.

A

INFORMED CONSENT

20
Q

What is change management?

A
  • It is an IT practice designed to minimize disruptions to IT services while making changes to critical systems and services.
  • A change is adding, modifying, or removing anything that could have a direct/indirect effect on services.
21
Q

How should proprietary information be classified?

A

Confidential

22
Q

What is a digital signature?

A
  • It is a cryptographic technique used to verify the authenticity and integrity of digital messages, etc.
  • Digital signatures are encrypted, geolocated, and time stamped to authenticate signer’s identity.
23
Q

What kind of encryption does digital signatures rely on?

A
  • Asymmetric encryption.
  • If a sender signs a message, they use their private key to create a unique digital signature.
  • Sender then transmits both original message and digital signature to the recipient.
  • The recipient employs the sender’s public keys to verify the authenticity of the signature.
24
Q

What is privacy?

A

In the context of the Trust Services Criteria, PRIVACY deals only with handling PERSONAL DATA (how it’s collected, used, retained, disclosed, disposed of)

25
Q

What is confidentiality?

A

It deals with a broad range of sensitive info, such as proprietary, strategic, financial, and personal data.

26
Q

What is the purpose of data security controls?

A

It is to ensure that storage media are subject to authorization prior to access, change, or destruction.

Examples of data security controls:
- Access control lists
- Firewalls
- Intrusion detection systems
- Intrusion prevention systems
- Data encryption

27
Q

What is public key encryption?

A
  • AKA Asymmetric key encryption.
  • It uses a pair of keys, a public key and a private key, to encrypt and decrypt data, respectively.
  • Public key is available to anyone who wants to send an encrypted message to the owner of the private key.
  • The public key is used to encrypt the data and can be shared freely.
28
Q

What is private key encryption?

A
  • AKA Symmetric key encryption.
  • The same key is used to both encrypt and decrypt the message.
  • The sender and recipient must have the same encryption key in order to communicate securely.
29
Q

Data Loss Prevention solutions are designed to do what?

A

To protect data based on the data’s state (at rest, in transit, in use)

30
Q

What is Acceptable Use Policy?

A

They are policies that establish guidelines for the use of an organization’s assets (hardware, software)